Computers 2e

Computers 2e

12th Grade

50 Qs

quiz-placeholder

Similar activities

Microsoft Word Tekrar

Microsoft Word Tekrar

9th - 12th Grade

50 Qs

ÔN TẬP HK1

ÔN TẬP HK1

12th Grade

50 Qs

TABLAS EN WORD

TABLAS EN WORD

6th - 12th Grade

45 Qs

SUMATIF AKHIR SEMESTER KELAS VII

SUMATIF AKHIR SEMESTER KELAS VII

7th Grade - University

50 Qs

Information Technology, the Internet, and You

Information Technology, the Internet, and You

12th Grade - University

46 Qs

9.2 Homework 4

9.2 Homework 4

9th - 12th Grade

46 Qs

eSkill-8

eSkill-8

12th Grade

54 Qs

Quiz TIK

Quiz TIK

12th Grade

45 Qs

Computers 2e

Computers 2e

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Akau Anyieth

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #201

Topic 1

A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?


  • A. Escalate the ticket to Tier 2.

  • B. Run a virus scan.

  • C. Utilize a Windows restore point.

  • D. Reimage the computer.

Answer explanation

When a user reports unusual behavior on a workstation after opening a suspicious email, the first and most immediate step should be to run a virus scan to check for malware or malicious software. Running a virus scan will help identify and potentially remove any threats that might have been introduced through the suspicious email. Escalating the ticket, using a Windows restore point, or reimaging the computer can be considered as follow-up steps depending on the results of the virus scan and the severity of the issue, but running a virus scan is the initial action to take in this scenario to address potential security threats.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #202

Topic 1

Which of the following wireless security features can be enabled to allow a user to use login credentials to attach to available corporate SSIDs?


  • A. TACACS+

  • B. Kerberos

  • C. Preshared key

  • D. WPA2/AES

Answer explanation

Kerberos is a network authentication protocol that can be used to provide secure authentication for users connecting to corporate SSIDs (Service Set Identifiers) via wireless networks. It allows users to use login credentials to authenticate themselves securely on the network.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #203

Topic 1

Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?


  • A. Security groups

  • B. Access control list

  • C. Group Policy

  • D. Login script

Answer explanation

Group policy is used to change the security settings of users

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #204

Topic 1

Which of the following often uses an SMS or third-party application as a secondary method to access a system?


  • A. MFA

  • B. WPA2

  • C. AES

  • D. RADIUS

Answer explanation

  • Often websites, or web-application services will require a second step/method to login, most use SMS to quickly send a verification, if not, verification is often done through their self-provided, or trusted third party app authenticator.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #205

Topic 1

A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should the technician use to configure the setting?


  • A. System

  • B. Power Options

  • C. Devices and Printers

  • D. Device Manager

Answer explanation

Open the "Control Panel." Navigate to "Power Options." Click on the selected power plan (e.g., "Balanced" or "High Performance"). Click on "Change plan settings." Click on "Change advanced power settings." In the "Advanced settings" window, look for the "USB settings" category. Under "USB settings," you should find an option related to USB selective suspend. Set it to "Disabled." Click "Apply" and then "OK" to save the changes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #206

Topic 1

A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?


  • A. ipconfig

  • B. ifconfig

  • C. arpa

  • D. ping

Answer explanation

If you enter the command “ifconfig” in the terminal, all information will be displayed. You can also use the commands “ip addr” or “ip a”. Confirm with [Enter]. You'll now be shown all IP addresses that are in your network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Question #207

Topic 1

A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?


  • A. Phishing

  • B. Smishing

  • C. Whaling

  • D. Vishing

Answer explanation

Vishing, also known as Voice Phishing, is a social engineering attack where an attacker uses a phone call to impersonate a legitimate entity, such as a bank representative, government agency, or customer service representative. The attacker typically tries to manipulate the victim into revealing sensitive information, such as account numbers, passwords, or other personal information, by creating a sense of urgency or fear.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?